As the researchers pointed out, threats posed to users by hidden applications created almost 50% of all malicious activity in 2019.
Malware has also been found to use popular chat apps for Gamers but also fake videos as bait.
Legitimate applications containing location information, route maps and other information are also targeted by hackers.
Hidden applications - the biggest threat to mobile
As found in McAfee's research, hidden applications pose the greatest threat to mobile users.
In addition to being 50% of all malicious activity in 2019, the researchers also observed a 30% increase in these attacks.
Hidden apps have seen an increase lately, as users tend to spend more and more time in front of their mobile screens. So hackers take advantage of this habit by using third-party login services or by adding ads.
Research shows that every person in the world is expected to have 15 devices connected to the Internet on average, by 2030.
The more popular a game is, the more likely it is to become a target.
Hackers distribute malware via links to popular chat apps for gamers and videos, which contain links to fake applications.
Such applications are disguised as icons that resemble real applications. However, their purpose is to serve and collect spam data of users.
According to researchers, there are fake versions of popular applications such as FaceApp, Spotify and Call of Duty.
In addition, researchers have discovered a malicious mobile app called "LeifAccess" (or Shopper).
Malicious Shopper software was accessing features Android for creating accounts, downloading applications, and publishing reviews using credentials stolen from the victim's device.
Another malware called MalBus has been found in many transit applications in South Korea that have been used to undermine the data (such as bus stops, itineraries and schedules for over 5 years) of daily commute traffic. The applications were integrated with a fake library and an add-in that could extract confidential files.
There is no doubt that hackers are trying in every way to remain invisible while trying to steal personal information from users' devices.
It is therefore of the utmost importance that both developers and users take into account new methods of malware and take the necessary steps to remain safe.